...phishing authors are keeping with the times, and are increasing their chances of successful exploitation by targeting a variety of third-party software, in addition to the more common Internet Explorer vulnerabilities we see being targeted. It also speaks to users not quickly applying application patches when attackers find it worth their while to attack bugs that have been patched for months.